Purpose - needs a statement of why the system is in place
a statement about the educational uses and advantages of the internet
a description of the instructional philosophies, strategies and goals to be supported by internet access in schools
digital citizenship
Delegation of Responsibility: List parents as one of the groups responsible for teaching their kids about proper internet usage. Many other AUPs list "parents" multiple times as responsible parties.
As part of the CIPA compliance, it needs a disclaimer saying "the organization does not warrant the effectiveness of Internet filtering."
3. Delegation of responsibilites
The following individuals are entitled to use the network:
1.All district staff
2.All district students under the supervision of a staff member and/or parent/ guardian.
3. Others who request guest accounts from the Coordinator of Technology and Information Services. These requests will be reviewed on a case-by-case basis and will be granted, if warranted, as needs and resources permit, for a limited time, following approval.
The high school library computers do not have logins and they are regularly used by others such as daily substitutes and student teachers, are these people considered temporary emloyees? What about when the libraries are used for meetings after school or in the evenings ... parents or volunteers can be using the computers since a district login and password is not required to use the computers. All they have to do is click enter.
4. Guidelines
Network accounts shall be used only by the authorized owner of the account for its approved purpose... since students do not have individual logins this is impossible to monitor. All communications and information accessible via the network should be assumed to be private property and shall not be disclosed. Network user shall respect the privacy of other users on the system.
Prohibitions
Students and staff are expected to act in a responsible, ethical and legal manner in accordance with district policy, accepted rules of network etiquette, and federal and state law. Specifically, the following uses are prohibited:
1. Facilitating illegal activity.
2. Commercial or for-profit purpose.
3. Non-work or non-school related work. Someone needs to tell this to teachers who send their students to the library during recess to play games. Again this is impossible to monitor since students come and go and use the computers without a login. --- Whose responsibility is it to monitor computer use? Without monitoring software and logins in the high school, it is often impossible to see what everyone is doing in the library on the computers. Imagine monitoring 40 students at once while trying to teach in another area of the library ...
14. Fraudulent copying, communications, or modification of materials in violation of copyright laws. This needs to either be changed to violating copyright laws or needs to be further defined because the way it is written indicates a misunderstanding of copyright laws and fair use.
Security
System security is protected through the use of passwords. Failure to adequately protect or update passwords could result in unauthorized access to personal or district files. To protect the integrity of the system, the following guidelines shall be followed:
1. Employees and students shall not reveal their passwords to another individual.
2. Users are not to use a computer that has been logged in under another student’s or employee’s name. Students do not have logins and there should be consequences if a teacher leaves themself logged in to a computer... especially in a lab or library.
3. Any user identified as a security risk or having a history of problems with other computer systems may be denied access to the network. None of this applies to Methacton since our students do not have logins and passwords... we have to either get students logins and passwords or change this.
Students may use the Internet in instructional areas where there is a teacher or staff supervision. This can not be enforced at the elementary level when teachers send students to the library during the librarians "duty free" lunch. Teachers may allow students to use the Internet in the following ways: This part of the policy seems a little too restrictive or detailed. Policy needs to be broader so that procedures can be written to accomidate district needs.
1. Directed searches
Teachers may work directly with small groups of students or with an entire class. Internet access will be limited to those sites approved by the teacher and previewed in advance. This is no longer possible since the state of PA has decided to no longer provide Nettrekker (a search engine database of websites reviewed and evaluated by teachers). The way other search engines work, it is impossible to get the same hits each time the search is conducted. A teacher may review sites in the morning but those sites may not be available when the search is done with students in the afternoon. Directed searches are a good idea but it is not practical to require teachers to review each site prior to class. It may be in the district's interest to purchase access to Nettrekker if this item remains in the document.
Use of directed searches does not require parental permission since the Internet sites will be screened in advance by the teacher. Teachers will be responsible for reviewing the Internet policy and procedures with students prior to any directed searches.
d. This policy will also be part of each school’s student-parent handbook.
Student and parent signatures on the student-parent handbook’s signature page will signify acceptance with the district’s Acceptable Use of the Internet Policy. Previously the AUP was a separate document (not part of the handbook) that was kept on file in the school library after it was signed by parents and students. Who will now be responsible if this is part of the handbook?
3. Any user identified as a security risk or having a history of problems with other computer systems may be denied access to the network. How is this going to be determined since students do not have logins and how is it going to be enforced since not all students are know to all teachers and librarians.
Independent Searches
c. Students are not presently issued Internet e-mail accounts. Educational use of the Internet e-mail can be accessed through the classroom teacher’s or specifically created group user account. Students in the high school are using their own email accounts that are not group-created by the teacher. It is necessary to let them since they are not issued school email accounts, because they are not given network space (so they often need to "email themselves" documents they need for class, and because teachers often require them to email assignments to them.
- 3. Delegation of responsibilites
The following individuals are entitled to use the network:1. All district staff
2. All district students under the supervision of a staff member and/or parent/ guardian.
3. Others who request guest accounts from the Coordinator of Technology and Information Services. These requests will be reviewed on a case-by-case basis and will be granted, if warranted, as needs and resources permit, for a limited time, following approval.
The high school library computers do not have logins and they are regularly used by others such as daily substitutes and student teachers, are these people considered temporary emloyees? What about when the libraries are used for meetings after school or in the evenings ... parents or volunteers can be using the computers since a district login and password is not required to use the computers. All they have to do is click enter.
- 4. Guidelines
Network accounts shall be used only by the authorized owner of the account for its approved purpose... since students do not have individual logins this is impossible to monitor. All communications and information accessible via the network should be assumed to be private property and shall not be disclosed. Network user shall respect the privacy of other users on the system.- Prohibitions
Students and staff are expected to act in a responsible, ethical and legal manner in accordance with district policy, accepted rules of network etiquette, and federal and state law. Specifically, the following uses are prohibited:1. Facilitating illegal activity.
2. Commercial or for-profit purpose.
3. Non-work or non-school related work. Someone needs to tell this to teachers who send their students to the library during recess to play games. Again this is impossible to monitor since students come and go and use the computers without a login.
--- Whose responsibility is it to monitor computer use? Without monitoring software and logins in the high school, it is often impossible to see what everyone is doing in the library on the computers. Imagine monitoring 40 students at once while trying to teach in another area of the library ...
14. Fraudulent copying, communications, or modification of materials in violation of copyright laws. This needs to either be changed to violating copyright laws or needs to be further defined because the way it is written indicates a misunderstanding of copyright laws and fair use.
System security is protected through the use of passwords. Failure to adequately protect or update passwords could result in unauthorized access to personal or district files. To protect the integrity of the system, the following guidelines shall be followed:
1. Employees and students shall not reveal their passwords to another individual.
2. Users are not to use a computer that has been logged in under another student’s or employee’s name. Students do not have logins and there should be consequences if a teacher leaves themself logged in to a computer... especially in a lab or library.
3. Any user identified as a security risk or having a history of problems with other computer systems may be denied access to the network.
None of this applies to Methacton since our students do not have logins and passwords... we have to either get students logins and passwords or change this.
Students may use the Internet in instructional areas where there is a teacher or staff supervision. This can not be enforced at the elementary level when teachers send students to the library during the librarians "duty free" lunch. Teachers may allow students to use the Internet in the following ways:
This part of the policy seems a little too restrictive or detailed. Policy needs to be broader so that procedures can be written to accomidate district needs.
Teachers may work directly with small groups of students or with an entire class. Internet access will be limited to those sites approved by the teacher and previewed in advance. This is no longer possible since the state of PA has decided to no longer provide Nettrekker (a search engine database of websites reviewed and evaluated by teachers). The way other search engines work, it is impossible to get the same hits each time the search is conducted. A teacher may review sites in the morning but those sites may not be available when the search is done with students in the afternoon. Directed searches are a good idea but it is not practical to require teachers to review each site prior to class. It may be in the district's interest to purchase access to Nettrekker if this item remains in the document.
Use of directed searches does not require parental permission since the Internet sites will be screened in advance by the teacher. Teachers will be responsible for reviewing the Internet policy and procedures with students prior to any directed searches.
d. This policy will also be part of each school’s student-parent handbook.
Student and parent signatures on the student-parent handbook’s signature page will signify acceptance with the district’s Acceptable Use of the Internet Policy. Previously the AUP was a separate document (not part of the handbook) that was kept on file in the school library after it was signed by parents and students. Who will now be responsible if this is part of the handbook?
3. Any user identified as a security risk or having a history of problems with other computer systems may be denied access to the network. How is this going to be determined since students do not have logins and how is it going to be enforced since not all students are know to all teachers and librarians.
Students in the high school are using their own email accounts that are not group-created by the teacher. It is necessary to let them since they are not issued school email accounts, because they are not given network space (so they often need to "email themselves" documents they need for class, and because teachers often require them to email assignments to them.